Category Strategy, Policy & Governance

Enterprise architecture

buisnessarchitecture

The term enterprise can be defined as describing an organizational unit, organization, or collection of organizations that share a set of common goals and collaborate to provide specific products or services to customers. In that sense, the term enterprise covers various…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Militaries racing to develop hypersonic cruise missiles after deploying Boost-glide vehicles

hypersoniccruisemissiles

Hypersonic weapons typically travel at Mach 5 to Mach 10 — or speeds of 3,840 to 7,680 miles per hour. A missile traveling at Mach 5 could hit a target 100 miles away in about 1 minute and 34 seconds. A…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

North Korea perfecting ICBM capable to deliver a nuclear weapon anywhere in the United States, driving US to enhance its Ground-Based Midcourse Missile Defense (GMD)

ICBM North Korea

Throughout 2017, North Korea tested several missiles demonstrating the rapid advances in its military technology. The Hwasong-12 was thought to be able to reach as far as 4,500km (2,800 miles), putting US military bases on the Pacific island of Guam…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cyber Moonshot and Accelerating Security of Systems with Emerging Technologies (ASSET)

cybermoonshot

The nation’s critical infrastructure is increasingly dependent on the Internet, while cybersecurity attacks are on the rise. Cybersecurity threats are becoming more frequent, more sophisticated, and more destructive—gradually eroding society’s trust in digital infrastructure. As technology continues to advance and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Requirements development and analysis, Requirements Verification & Validation critical for Military acquisition

QRAnalysis

Requirements development is paramount to successful acquisition outcomes. Properly developed requirements enhance competition, ensure sound business strategies, provide the basis for realistic Government estimates, mitigate requirements creep, and help the Department to meet critical acquisition timelines. Systems Analysis of weapon…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Amid China’s military quantum lead, US declares quantum as a “critical technology” and launches National Quantum Initiative

chinaquantumen

The quest for quantum computing supremacy is a geopolitical priority for Europe, China, Canada, Australia and the United States. Boston Consulting Group’s 2018 report that estimates a quantum computing market of nearing $60 billion in 2035, which would grow further to…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Threat of Biological warfare, Bioterrorism and Bio accidents requires comprehensive Biodefense strategy

biocorona

Naturally occurring threats such as influenza, Ebola, and Chikungunya are bypassing borders to emerge in nations oceans away, and exact a continued toll. The Pandemic and highly pathogenic influenzas challenge the globe every year and result in the loss of…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Challenge of Attribution of Malicious Cyber Actors amidst growing Cyber attacks and Cyberwarfare

Attribution Cyber Actors

Cyber warfare refers to the use of technology to launch attacks on nations, governments and citizens, causing comparable harm to actual warfare using weaponry. Cyberwarfare has developed into a more sophisticated type of combat between countries, where you can destroy…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Crowdsourcing to accelerate development of Innovative and disruptive technologies and Military innovation

crowdsourcing

Innovation crowdsourcing is a business practice that engages the crowds with the goal of generating ideas and co-creating solutions within an end-to-end innovation process. This practice does not actually outsource innovation activities but connects teams with multiple knowledge sources to…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

With China engaging in massive military buildup near the Borders, India preparing to safeguard its interests.

indochina

China’s construction of military infrastructure along its border with India suggests Beijing is considering military options amidst a territorial dispute between the two countries. China’s aggressive strategy will likely prompt India to respond in kind, leading to a greater concentration…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here